메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1387-1394

Measuring the effectiveness and the fairness of relation hiding systems

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION MANAGEMENT; MINING;

EID: 67049107919     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/APSCC.2008.20     Document Type: Conference Paper
Times cited : (6)

References (33)
  • 1
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding, anonymity and privacy: A modular approach
    • D. Hughes and V. Shmatikov, "Information hiding, anonymity and privacy: a modular approach," Journal of Computer Security, vol.12, no. 1, pp. 3-36, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2
  • 2
    • 50249128197 scopus 로고    scopus 로고
    • An indistinguishability-based characterization of anonymous channels
    • Leuven, Belgium, July 23-25, Proceedings, Lecture Notes in Computer Science, N. Borisov and I. Goldberg, Eds. Springer
    • A. Hevia and D. Micciancio, "An indistinguishability-based characterization of anonymous channels," in Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings, ser. Lecture Notes in Computer Science, N. Borisov and I. Goldberg, Eds., vol.5134. Springer, pp. 24-43.
    • (2008) Privacy Enhancing Technologies, 8th International Symposium, PETS 2008 , vol.5134 , pp. 24-43
    • Hevia, A.1    Micciancio, D.2
  • 3
    • 45949087897 scopus 로고    scopus 로고
    • On the fundamentals of anonymity metrics
    • ser. IFIP International Federation for Information Processing. Springer Science & Business Media
    • C. Andersson and R. Lundin, "On the fundamentals of anonymity metrics," in The Future of Identity in the Information Society, ser. IFIP International Federation for Information Processing. Springer Science & Business Media, 2008.
    • (2008) The Future of Identity in the Information Society
    • Andersson, C.1    Lundin, R.2
  • 4
    • 33746594541 scopus 로고    scopus 로고
    • A framework for quantification of linkability within a privacy-enhancing identity management system
    • Emerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Proceedings
    • S. Clauß, "A framework for quantification of linkability within a privacy-enhancing identity management system," in Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings, ser. Lecture Notes in Computer Science, G. Müller, Ed., vol.3995. Springer Verlag, pp. 191-205. (Pubitemid 44156249)
    • (2006) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , vol.3995 , pp. 191-205
    • Clauss, S.1
  • 8
    • 84957800033 scopus 로고    scopus 로고
    • Towards Measuring Anonymity
    • Privacy Enhancing Technologies
    • C. D́1az, S. Seys, J. Claessens, and B. Preneel, "Towards measuring anonymity," in Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, ser. Lecture Notes in Computer Science, R. Dingledine and P. F. Syverson, Eds., no. 2482. Springer Verlag, Berlin, 2002, pp. 54-68. (Pubitemid 36309879)
    • (2003) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2482 , pp. 54-68
    • Diaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 9
    • 34748911762 scopus 로고    scopus 로고
    • A combinatorial approach to measuring anonymity
    • 4258723, ISI 2007: 2007 IEEE Intelligence and Security Informatics
    • M. Edman, F. Sivrikaya, and B. Yener, "A combinatorial approach to measuring anonymity," in Proceedings of the 2007 IEEE International Conference on Intelligence and Security Informatics. IEEE, 2007. (Pubitemid 47469264)
    • (2007) ISI 2007: 2007 IEEE Intelligence and Security Informatics , pp. 357-364
    • Edman, M.1    Sivrikaya, F.2    Yener, B.3
  • 10
    • 38149112556 scopus 로고    scopus 로고
    • Attacking unlinkability: The importance of context
    • Canada, June 20-22, Revised Selected Papers, ser. Lecture Notes in Computer Science, N. Borisov and P. Golle, Eds, Springer Verlag, Berlin
    • M. Franz, B. Meyer, and A. Pashalidis, "Attacking unlinkability: The importance of context," in Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers, ser. Lecture Notes in Computer Science, N. Borisov and P. Golle, Eds., vol.4776. Springer Verlag, Berlin, pp. 1-16.
    • (2007) Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa , vol.4776 , pp. 1-16
    • Franz, M.1    Meyer, B.2    Pashalidis, A.3
  • 11
    • 33645976295 scopus 로고    scopus 로고
    • Linkability in Practical Electronic Cash Design
    • G. Maitland, J. Reid, E. Foo, C. Boyd, and E. Dawson, "Linkability in practical electronic cash design," in Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, ser. Lecture Notes in Computer Science, J. Pieprzyk, E. Okamoto, and J. Seberry, Eds., vol.1975. Springer Verlag, pp. 149-163. (Pubitemid 33209754)
    • (2000) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1975 , pp. 149-163
    • Maitland, G.1    Reid, J.2    Foo, E.3    Boyd, C.4    Dawson, E.5
  • 12
    • 84957802536 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • San Francisco, CA, USA, April 14-15, Revised Papers, ser. Lecture Notes in Computer Science, R. Dingledine and P. F. Syverson, Eds. Springer Verlag, Berlin
    • A. Serjantov and G. Danezis, "Towards an information theoretic metric for anonymity," in Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14- 15, 2002, Revised Papers, ser. Lecture Notes in Computer Science, R. Dingledine and P. F. Syverson, Eds., vol.2482. Springer Verlag, Berlin, pp. 41-53.
    • (2002) Privacy Enhancing Technologies, Second International Workshop, PET 2002 , vol.2482 , pp. 41-53
    • Serjantov, A.1    Danezis, G.2
  • 15
    • 35248849922 scopus 로고    scopus 로고
    • Modelling unlinkability
    • ser. Lecture Notes in Computer Science, R. Dingledine, Ed., Springer Verlag, Berlin, Dresden, Germany, March 26-28, Revised Papers
    • S. Steinbrecher and S. Köpsell, "Modelling unlinkability," in Privacy Enhancing Technologies, Third International Workshop, PET 2003, Dresden, Germany, March 26-28, 2003, Revised Papers, ser. Lecture Notes in Computer Science, R. Dingledine, Ed., vol.2760. Springer Verlag, Berlin, pp. 32-47.
    • (2003) Privacy Enhancing Technologies, Third International Workshop, PET 2003 , vol.2760 , pp. 32-47
    • Steinbrecher, S.1    Köpsell, S.2
  • 16
    • 35248843604 scopus 로고    scopus 로고
    • Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
    • ser. Lecture Notes in Computer Science, E. Biham, Ed., Springer, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, Proceedings
    • M. Bellare, D. Micciancio, and B. Warinschi, "Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions," in Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, ser. Lecture Notes in Computer Science, E. Biham, Ed., vol.2656. Springer, pp. 614-629.
    • (2003) Advances in Cryptology - EUROCRYPT 2003 , vol.2656 , pp. 614-629
    • Bellare, M.1    Micciancio, D.2    Warinschi, B.3
  • 17
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol.28, no. 4, pp. 656-715, 1949. [Online]. Available: http://netlab.cs.ucla.edu/wiki/files/shannon1949.pdf
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 18
    • 24344501784 scopus 로고    scopus 로고
    • Measuring anonymity in a non-adaptive, realtime system
    • ser. Lecture Notes in Computer Science, D. Martin and A. Serjantov, Eds., Springer Verlag, Berlin, Toronto, Canada, May 26-28, Revised Selected Papers
    • G. Tóth and Z. Hornák, "Measuring anonymity in a non-adaptive, realtime system," in Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers, ser. Lecture Notes in Computer Science, D. Martin and A. Serjantov, Eds., vol.3424. Springer Verlag, Berlin, pp. 226-241.
    • (2004) Privacy Enhancing Technologies, 4th International Workshop, PET 2004 , vol.3424 , pp. 226-241
    • Tóth, G.1    Hornák, Z.2
  • 21
    • 0003773445 scopus 로고
    • A quantitative measure of fairness and discrimination for resource allocation in shared computer systems
    • R. Jain, D. Chiu, and W. Hawe, "A quantitative measure of fairness and discrimination for resource allocation in shared computer systems," DEC, Research Report TR-301, 1984.
    • (1984) DEC, Research Report TR-301
    • Jain, R.1    Chiu, D.2    Hawe, W.3
  • 22
    • 8344222702 scopus 로고    scopus 로고
    • Fair bandwidth sharing algorithms based on game theory frameworks for wireless ad-hoc networks
    • The 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, Hong Kong, China, March 7-11, IEEE
    • Z. Fang and B. Bensaou, "Fair bandwidth sharing algorithms based on game theory frameworks for wireless ad-hoc networks," in Proceedings of IEEE INFOCOM 2004, The 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, Hong Kong, China, March 7-11, 2004. IEEE, 2004.
    • (2004) Proceedings of IEEE INFOCOM 2004
    • Fang, Z.1    Bensaou, B.2
  • 23
    • 0041973662 scopus 로고    scopus 로고
    • The impact of multihop wireless channel on TCP throughput and loss
    • IEEE, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, April 3
    • Z. Fu, P. Zerfos, H. Luo, S. Lu, L. Zhang, and M. Gerla, "The impact of multihop wireless channel on TCP throughput and loss," in Proceedings of IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30-April 3, 2003. IEEE, 2003.
    • (2003) Proceedings of IEEE INFOCOM 2003
    • Fu, Z.1    Zerfos, P.2    Luo, H.3    Lu, S.4    Zhang, L.5    Gerla, M.6
  • 26
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D. Chaum, "Security without identification: transaction systems to make big brother obsolete," Communications of the ACM, vol.28, no. 10, pp. 1030-1044, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 27
    • 85032463527 scopus 로고
    • Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms
    • ser. Lecture Notes in Computer Science, J. Seberry and J. Pieprzyk, Eds., Springer Verlag, Berlin
    • "Showing credentials without identification: transferring signatures between unconditionally unlinkable pseudonyms," in Advances in Cryptology - AUSCRYPT 90, ser. Lecture Notes in Computer Science, J. Seberry and J. Pieprzyk, Eds., vol.453. Springer Verlag, Berlin, 1990, pp. 246-264.
    • (1990) Advances in Cryptology - AUSCRYPT 90 , vol.453 , pp. 246-264
  • 28
    • 84955571224 scopus 로고    scopus 로고
    • Access with Pseudonyms
    • Cryptography: Policy and Algorithms
    • L. Chen, "Access with pseudonyms," in Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, ser. Lecture Notes in in Computer Science, E. Dawson and J. D. Golic, Eds., no. 1029. Springer Verlag, Berlin, 1995, pp. 232-243. (Pubitemid 126030177)
    • (1996) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1029 , pp. 232-243
    • Chen, L.1
  • 29
    • 0019532104 scopus 로고
    • UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS.
    • DOI 10.1145/358549.358563
    • D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol.24, no. 2, pp. 84-90, 1981. (Pubitemid 11480996)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum David, L.1
  • 32
    • 84885209870 scopus 로고    scopus 로고
    • Private social network analysis: How to assemble pieces of a graph privately
    • ACM Press
    • K. B. Frikken and P. Golle, "Private social network analysis: How to assemble pieces of a graph privately," in 2006 Workshop on Privacy in the Electronic Society. ACM Press, 2006, pp. 89-97.
    • (2006) 2006 Workshop on Privacy in the Electronic Society , pp. 89-97
    • Frikken, K.B.1    Golle, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.